top of page
Enterprise Security Tech
A cybersecurity resource for CxOs
Search
Mar 31, 2022
Detection Script for Spring4Shell
On March 30, 2022, a now-deleted Twitter post detailed the proof-of-concept of a zero-day vulnerability in Java Spring Core set security...
Mar 16, 2022
Cider Security Publishes New Research Identifying the Top 10 CI/CD Security Risks
Researchers from Cider Security published a new research report, “Top 10 CI/CD Security Risks”, detailing the major security risks to the...
Mar 10, 2022
Critical Vulnerability Discovered by Orca Security in MSFT Azure Puts Fortune 500 Companies at Risk
Orca Security researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. This serious flaw would...
Feb 25, 2022
Samsung Shipped 100 Million Phones With Flawed Encryption
According to The Register, Samsung shipped '100 million' phones with flawed encryption. Researchers at TelAviv University demonstrated a...
Feb 23, 2022
RiskRecon: Orgs With Poor Cybersecurity Hygiene Have 40x Higher Rates of Destructive Ransomware
RiskRecon, a Mastercard company, recently announced new research “Analyzing the Cybersecurity Hygiene of Ransomware Victims," which...
Feb 9, 2022
Compromised Credentials Affect 44% of Companies in Supply Chain, Research Finds
Panorays, a leading provider of third-party security risk management software, has today identified the top five most common cyber gaps...
bottom of page